CN116915499A - Popularization data processing method and system - Google Patents

Popularization data processing method and system Download PDF

Info

Publication number
CN116915499A
CN116915499A CN202311132053.4A CN202311132053A CN116915499A CN 116915499 A CN116915499 A CN 116915499A CN 202311132053 A CN202311132053 A CN 202311132053A CN 116915499 A CN116915499 A CN 116915499A
Authority
CN
China
Prior art keywords
data
algorithm
client
encrypted data
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311132053.4A
Other languages
Chinese (zh)
Other versions
CN116915499B (en
Inventor
邱林
于滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Daju Zhilian Technology Co ltd
Original Assignee
Beijing Daju Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Daju Zhilian Technology Co ltd filed Critical Beijing Daju Zhilian Technology Co ltd
Priority to CN202311132053.4A priority Critical patent/CN116915499B/en
Publication of CN116915499A publication Critical patent/CN116915499A/en
Application granted granted Critical
Publication of CN116915499B publication Critical patent/CN116915499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of big data, in particular to a popularization data processing method and a popularization data processing system, wherein the popularization data processing method comprises a sending end, a server and a client; the transmitting end acquires popularization data and popularization conditions; the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server; the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm. The invention ensures that even if the server transmits data between the sending end and the client, the data is always encrypted by one or two encryption algorithms, and the sending end and the client can successfully decrypt the encryption performed by themselves so as to ensure the accuracy of data transmission and avoid the malicious acquisition and leakage of the data by the server.

Description

Popularization data processing method and system
Technical Field
The invention relates to the field of big data, in particular to a popularization data processing method for guaranteeing the safety of the big data.
Background
In the data promotion, the server of the transaction platform is usually a client of a plurality of users held by hand, when a merchant serving as a sending end wants to put advertisements, the advertisement serving as promotion data and promotion conditions corresponding to the advertisement can be directly sent to the server, the server pushes the data, and when the client in the user hand is willing to trade with the merchant of the advertisement, a transaction request can be actively sent to the merchant to realize the transaction.
For example, the video advertisement of the divorce institute and the promotion condition of the main divorce official are transmitted to the server of the transaction platform, and the server of the transaction platform can search the client of the divorce related vocabulary entry or the video advertisement of the divorce institute of the client of the user or the clients of all users of the server which are known to be divorced. If the user is interested, the request can be sent to the sending end of the law firm directly through the server.
The above-described approach has the following disadvantages:
1. users fear that the platform server knows the privacy of the users about to divorce, and the users do not dare to randomly place orders on a certain untrusted platform.
2. Merchants are also afraid of letting the platform server learn that the customer is to contact themselves, and other competitors are afraid of learning about the customer's transaction request.
3. If a hacker attacks the platform server, intercepts the transaction request of the user, or impersonates the sender to contact the user, the benefit of the sender who originally pays for delivering the promotional data is compromised.
Therefore, there is a need for a generalized data processing method that can bring security assurance to the signal transmission of a server between a sender and a client.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a popularization data processing method which has the advantages of simple structure, low cost and simple and convenient operation.
The invention discloses a popularization data processing method which comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
The invention discloses a promotion data processing method, wherein the client converts the transaction data into first encrypted data by a first encryption algorithm, and the method comprises the following steps of: the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
The invention discloses a promotion data processing method, wherein the encrypting the first encrypted data into second encrypted data by a second duplicate encryption method comprises the following steps:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
The invention relates to a promotion data processing method, wherein a first algorithm and a second algorithm corresponding to first classification data are prestored in a user side and a transmitting side, and when the first classification data corresponds to the first algorithm, the first algorithm is configured to be a first superposition encryption algorithm, and the second algorithm is configured to be a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
The invention discloses a promotion data processing method, wherein the first algorithm is as follows: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
The invention relates to a promotion data processing system, which comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
The invention discloses a promotion data processing system, wherein the client converts the transaction data into first encrypted data by a first encryption algorithm, and the promotion data processing system comprises the following steps: the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
The invention discloses a promotion data processing system, wherein the encrypting the first encrypted data into second encrypted data by a second combined encryption method comprises the following steps:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
The invention relates to a promotion data processing system, wherein a first algorithm and a second algorithm corresponding to first classification data are prestored in a user side and a transmitting side, and when the first classification data corresponds to the first algorithm, the first algorithm is configured to be a first superposition encryption algorithm, and the second algorithm is configured to be a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
The invention discloses a promotion data processing system, wherein the first algorithm is as follows: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
The popularization data processing method is different from the prior art in that the method can enable the client side sending the transaction request to the first encrypted data to decrypt the second encrypted data encrypted by the sending end, and then enable the third encrypted data decrypted by the client side to be sent back to the sending end, and the sending end decrypts the third encrypted data, so that even if the server transmits the data between the sending end and the client side, the data is always encrypted by one or two encryption algorithms, and the sending end and the client side can successfully decrypt the encryption performed by themselves, thereby ensuring the accuracy of data transmission and avoiding malicious acquisition and leakage of the data by the server.
The invention further relates to a promotion data processing method with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic diagram of a data flow of a generalized data processing method.
Detailed Description
As shown in FIG. 1, the popularization data processing method comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
According to the method, the client side sending the first encrypted data to the transaction request can decrypt the second encrypted data encrypted by the sending end, the third encrypted data decrypted by the client side is sent back to the sending end, and the sending end decrypts the second encrypted data, so that even if the server transmits data between the sending end and the client side, the data is always encrypted by one or two encryption algorithms, and the sending end and the client side can successfully decrypt the encrypted data, so that accuracy of data transmission is guaranteed, and the data is prevented from being maliciously acquired and leaked by the server.
Referring to fig. 1, the client encrypts and decrypts the transaction request with a first encryption algorithm and a first decryption algorithm to avoid the server from obtaining the transaction request, and the sender encrypts and decrypts with a second encryption algorithm and a second decryption algorithm to avoid the server from obtaining the transaction request, so that the privacy of the user is protected, other hackers are prevented from invading the server, the sender and the client are counterfeited to complete the transaction, and the benefit of the real sender is protected. The server as the carrier is required to complete the data transportation, and the carrier is encrypted at least once, so that the confidentiality and isolation of the data can be facilitated.
Referring to fig. 1, the step of the client converting the transaction data into first encrypted data by using a first encryption algorithm includes the following steps: the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
The invention avoids man-in-the-middle attack by repairing the first encryption method and the second encryption method. Specifically, in order to avoid a hacker or a server disguising a transmitting end receiving a transaction request, the first encrypted data is directly received, the second encrypted data is decrypted into third encrypted data by a spoofing client, and the server or the hacker decrypts the third encrypted data by itself by using a method of the server or the hacker. Thus, the benefits of revealing the privacy of the user, knowing the transaction request of the client by the competitor and the sending end are infringed. In order to avoid this, the client and the sender establish a consensus mechanism, that is, the sender and the client can classify the promotion data into the same first classification data, so that better identity information confirmation can be realized, and man-in-the-middle attack can be avoided.
For example, the man-in-the-middle attack described above is: the hacker or the server impersonates the sender and performs the same operation, and intercepts the transaction request, thereby disabling the whole system.
In order to avoid the man-in-the-middle attack, first classification data of all promotion data, such as promotion data of advertisements of law-gigging litigation agents, are pre-stored in a database of a transmitting end and a database of a client end, and are uniformly classified into first classification data of law-gigging class. The first classification data may be understood as a consensus class label. The sending end of the first encrypted data of the receiving client can identify the encryption type through the first classified data according to the encryption type of the first encrypted data, if the encryption type is matched with the first classified data, the first encrypted data is encrypted into second encrypted data, the second encrypted data is sent to the client, and if the second encrypted data is not the second encrypted data, the server can be directly alerted.
The above consensus mechanism may also be an algorithm that generates 0 in the first 5 bits of the hash value of the special code, which may be generated by the sha256 algorithm, when transmitting, so as to obtain a consensus.
Referring to fig. 1, the encrypting the first encrypted data into the second encrypted data by the second encryption method includes:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
The invention can avoid that the sending end can not decrypt after the client is decrypted into the third encrypted data after the encrypted method by the two coincident encryption methods which are not mutually influenced.
Referring to fig. 1, the user side and the transmitting side pre-store a first algorithm and a second algorithm corresponding to the first classification data, and when the first classification data corresponds to the first algorithm, the first algorithm is configured as a first superposition encryption algorithm, and the second algorithm is configured as a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
The invention can pre-store the algorithms which are not affected each other as few as possible through the two algorithms respectively, and effectively distinguish whether the sending end and the client end use the correct coincident encryption algorithm, thereby not only occupying less memory, but also effectively avoiding man-in-the-middle attack.
Referring to fig. 1, the first algorithm is: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
The invention changes the display meaning of the data and the sequence of the display line number of the data by the two adjustment letter positions to carry out two mutually unaffected encryption modes, thereby further enhancing the safety of the data, ensuring the smooth encryption and decryption of the data and avoiding man-in-the-middle attack.
The encryption types may be: shifting each letter forward or backward by n bits in the 26 alphabet, e.g., abc forward by 1 bit is bcd. The above n may be determined by a hash value of the first classification data. For example, the hash value is calculated by the sha256 algorithm, and the remainder of dividing the hash value by 26 is 2, and n is 2. It is to be noted that z may become b when moving 2 bits to the right.
Of course, the encryption types mentioned above may also be: and encrypting each row of letters according to the position row number corresponding to the first classification data. For example, the first classification data is a law class. The corresponding line number is 654321, and the line number of the transaction request or the first encrypted data may be 12345; that is, the first encrypted data is divided into 5 rows, the first row corresponds to the first row and the second row corresponds to the second row, and the sixth row is blank, and the first row is adjusted to be blank, and the second row is adjusted to be the fifth row. Blank 54321. Thereby, the first classified data corresponds to the first classified data, and the first classified data is encrypted.
The number of the line number corresponding to the first classified data is pre-stored in a database.
Wherein the number of bits of the number is equal to or greater than the number of lines of the first encrypted data. And when the number of the digits is larger than the number of the lines of the first encrypted data, supplementing the contents of other lines of the first encrypted data as blank.
Wherein encryption of one encryption method does not affect encryption and decryption of another encryption method.
The invention has the advantages that: the method and the system avoid man-in-the-middle attack, the platform cuts off advertisement senders and advertisement receiving users, the advertisement receiving users are interested in advertisements of senders, and when the users want to contact the senders through the platform or directly contact the senders, if the requests are attacked by the man-in-the-middle, the man-in-the-middle can become the sender at the time, and losses are brought to the real senders.
The language code may not be suitable for encryption of the transformation line number, which represents only one example, and the encryption of the actual transformation line number is suitable for encryption of the source code.
The invention relates to a promotion data processing system, which comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
According to the method, the client side sending the first encrypted data to the transaction request can decrypt the second encrypted data encrypted by the sending end, the third encrypted data decrypted by the client side is sent back to the sending end, and the sending end decrypts the second encrypted data, so that even if the server transmits data between the sending end and the client side, the data is always encrypted by one or two encryption algorithms, and the sending end and the client side can successfully decrypt the encrypted data, so that accuracy of data transmission is guaranteed, and the data is prevented from being maliciously acquired and leaked by the server.
Referring to fig. 1, the client encrypts and decrypts the transaction request with a first encryption algorithm and a first decryption algorithm to avoid the server from obtaining the transaction request, and the sender encrypts and decrypts with a second encryption algorithm and a second decryption algorithm to avoid the server from obtaining the transaction request, so that the privacy of the user is protected, other hackers are prevented from invading the server, the sender and the client are counterfeited to complete the transaction, and the benefit of the real sender is protected. The server as the carrier is required to complete the data transportation, and the carrier is encrypted at least once, so that the confidentiality and isolation of the data can be facilitated.
Referring to fig. 1, the step of the client converting the transaction data into first encrypted data by using a first encryption algorithm includes the following steps: the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
The invention avoids man-in-the-middle attack by repairing the first encryption method and the second encryption method. Specifically, in order to avoid a hacker or a server disguising a transmitting end receiving a transaction request, the first encrypted data is directly received, the second encrypted data is decrypted into third encrypted data by a spoofing client, and the server or the hacker decrypts the third encrypted data by itself by using a method of the server or the hacker. Thus, the benefits of revealing the privacy of the user, knowing the transaction request of the client by the competitor and the sending end are infringed. In order to avoid this, the client and the sender establish a consensus mechanism, that is, the sender and the client can classify the promotion data into the same first classification data, so that better identity information confirmation can be realized, and man-in-the-middle attack can be avoided.
For example, the man-in-the-middle attack described above is: the hacker or the server impersonates the sender and performs the same operation, and intercepts the transaction request, thereby disabling the whole system.
In order to avoid the man-in-the-middle attack, first classification data of all promotion data, such as promotion data of advertisements of law-gigging litigation agents, are pre-stored in a database of a transmitting end and a database of a client end, and are uniformly classified into first classification data of law-gigging class. The first classification data may be understood as a consensus class label. The sending end of the first encrypted data of the receiving client can identify the encryption type through the first classified data according to the encryption type of the first encrypted data, if the encryption type is matched with the first classified data, the first encrypted data is encrypted into second encrypted data, the second encrypted data is sent to the client, and if the second encrypted data is not the second encrypted data, the server can be directly alerted.
The above consensus mechanism may also be an algorithm that generates 0 in the first 5 bits of the hash value of the special code, which may be generated by the sha256 algorithm, when transmitting, so as to obtain a consensus.
Referring to fig. 1, the encrypting the first encrypted data into the second encrypted data by the second encryption method includes:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
The invention can avoid that the sending end can not decrypt after the client is decrypted into the third encrypted data after the encrypted method by the two coincident encryption methods which are not mutually influenced.
Referring to fig. 1, the user side and the transmitting side pre-store a first algorithm and a second algorithm corresponding to the first classification data, and when the first classification data corresponds to the first algorithm, the first algorithm is configured as a first superposition encryption algorithm, and the second algorithm is configured as a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
The invention can pre-store the algorithms which are not affected each other as few as possible through the two algorithms respectively, and effectively distinguish whether the sending end and the client end use the correct coincident encryption algorithm, thereby not only occupying less memory, but also effectively avoiding man-in-the-middle attack.
Referring to fig. 1, the first algorithm is: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
The invention changes the display meaning of the data and the sequence of the display line number of the data by the two adjustment letter positions to carry out two mutually unaffected encryption modes, thereby further enhancing the safety of the data, ensuring the smooth encryption and decryption of the data and avoiding man-in-the-middle attack.
The encryption types may be: shifting each letter forward or backward by n bits in the 26 alphabet, e.g., abc forward by 1 bit is bcd. The above n may be determined by a hash value of the first classification data. For example, the hash value is calculated by the sha256 algorithm, and the remainder of dividing the hash value by 26 is 2, and n is 2. It is to be noted that z may become b when moving 2 bits to the right.
Of course, the encryption types mentioned above may also be: and encrypting each row of letters according to the position row number corresponding to the first classification data. For example, the first classification data is a law class. The corresponding line number is 654321, and the line number of the transaction request or the first encrypted data may be 12345; that is, the first encrypted data is divided into 5 rows, the first row corresponds to the first row and the second row corresponds to the second row, and the sixth row is blank, and the first row is adjusted to be blank, and the second row is adjusted to be the fifth row. Blank 54321. Thereby, the first classified data corresponds to the first classified data, and the first classified data is encrypted.
The number of the line number corresponding to the first classified data is pre-stored in a database.
Wherein the number of bits of the number is equal to or greater than the number of lines of the first encrypted data. And when the number of the digits is larger than the number of the lines of the first encrypted data, supplementing the contents of other lines of the first encrypted data as blank.
Wherein encryption of one encryption method does not affect encryption and decryption of another encryption method.
The invention has the advantages that: the method and the system avoid man-in-the-middle attack, the platform cuts off advertisement senders and advertisement receiving users, the advertisement receiving users are interested in advertisements of senders, and when the users want to contact the senders through the platform or directly contact the senders, if the requests are attacked by the man-in-the-middle, the man-in-the-middle can become the sender at the time, and losses are brought to the real senders.
The above examples are only illustrative of the preferred embodiments of the present invention and are not intended to limit the scope of the present invention, and various modifications and improvements made by those skilled in the art to the technical solution of the present invention should fall within the scope of protection defined by the claims of the present invention without departing from the spirit of the present invention.

Claims (10)

1. A popularization data processing method is characterized in that: the method comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
2. The promotional data processing method of claim 1, wherein: the client converting the transaction data into first encrypted data with a first encryption algorithm by the transaction request, comprising the steps of:
the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
3. The promotional data processing method of claim 2, wherein: the encrypting the first encrypted data into second encrypted data with a second hybrid encryption method includes:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
4. The promotional data processing method of claim 2, wherein: the user terminal and the transmitting terminal pre-store a first algorithm and a second algorithm corresponding to the first classified data,
when the first classification data corresponds to a first algorithm, configuring the first algorithm as a first superposition encryption algorithm, and configuring the second algorithm as a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
5. The promotional data processing method of claim 4, wherein: the first algorithm is as follows: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
6. A promotional data processing system, comprising: the method comprises a sending end, a server and a client;
the transmitting end acquires popularization data and popularization conditions;
the server sends promotion data to a client matched with the promotion conditions;
the client responds to the promotion data, and the client sends a transaction request to a sending end of the promotion data through a server;
the method for sending the transaction request to the popularization data sending end by the client through the server comprises the following steps:
the client converts the transaction request into first encrypted data by a first encryption algorithm, and the client sends the first encrypted data to the sending end through the server;
the sending end encrypts the first encrypted data into second encrypted data through a second encryption algorithm, and the sending end sends the second encrypted data to the client through the server;
the client converts the second encrypted data into third encrypted data by using a first decryption algorithm corresponding to the first encryption algorithm, and the client sends the third encrypted data to the sending end through the server;
the sending end converts the third encrypted data into a transaction request by utilizing a second decryption algorithm corresponding to the second encryption algorithm.
7. A promotional data processing system according to claim 6, wherein: the client converting the transaction data into first encrypted data with a first encryption algorithm by the transaction request, comprising the steps of:
the user side and the transmitting side pre-store first classification data corresponding to the promotion data;
the user terminal converts the transaction request into first encrypted data according to a first superposition encryption method configured by the first classified data;
the sending end encrypting the first encrypted data into second encrypted data by a second encryption algorithm comprises the following steps:
the client identifies second classified data corresponding to the first superposition encryption method, judges whether the second classified data is matched with prestored first classified data corresponding to the popularization data, encrypts the first encrypted data into second encrypted data by the second superposition encryption method if yes, and sends an alarm signal to the server if no.
8. A promotional data processing system according to claim 7, wherein: the encrypting the first encrypted data into second encrypted data with a second hybrid encryption method includes:
the encryption and decryption process of the first superposition encryption method and the encryption and decryption process of the second superposition encryption method are not mutually influenced.
9. A promotional data processing system according to claim 7, wherein: the user terminal and the transmitting terminal pre-store a first algorithm and a second algorithm corresponding to the first classified data,
when the first classification data corresponds to a first algorithm, configuring the first algorithm as a first superposition encryption algorithm, and configuring the second algorithm as a second superposition encryption algorithm;
and when the first classified data corresponds to a second algorithm, configuring the second algorithm as a first coincidence encryption algorithm, and configuring the first algorithm as a second coincidence encryption algorithm.
10. A promotional data processing system according to claim 9, wherein: the first algorithm is as follows: shifting each letter forward or backward by n bits in 26 alphabets, wherein n is the remainder of dividing the hash value of the first classified data obtained by the SHA256 algorithm by 26;
the second algorithm is as follows:
the transmitting end and the client pre-store the line number corresponding to the first classified data;
and adjusting the line number of the transaction request or the first encrypted data according to the line number.
CN202311132053.4A 2023-09-05 2023-09-05 Popularization data processing method and system Active CN116915499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311132053.4A CN116915499B (en) 2023-09-05 2023-09-05 Popularization data processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311132053.4A CN116915499B (en) 2023-09-05 2023-09-05 Popularization data processing method and system

Publications (2)

Publication Number Publication Date
CN116915499A true CN116915499A (en) 2023-10-20
CN116915499B CN116915499B (en) 2023-11-14

Family

ID=88356719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311132053.4A Active CN116915499B (en) 2023-09-05 2023-09-05 Popularization data processing method and system

Country Status (1)

Country Link
CN (1) CN116915499B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data
CN110535868A (en) * 2019-09-05 2019-12-03 山东浪潮商用系统有限公司 Data transmission method and system based on Hybrid Encryption algorithm
CN110636067A (en) * 2019-09-24 2019-12-31 天津五八到家科技有限公司 Data encryption method, data decryption method and device
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption
US20220255739A1 (en) * 2021-02-10 2022-08-11 Huazhong University Of Science And Technology Method and system for ensuring search completeness of searchable public key encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data
CN110535868A (en) * 2019-09-05 2019-12-03 山东浪潮商用系统有限公司 Data transmission method and system based on Hybrid Encryption algorithm
CN110636067A (en) * 2019-09-24 2019-12-31 天津五八到家科技有限公司 Data encryption method, data decryption method and device
US20220255739A1 (en) * 2021-02-10 2022-08-11 Huazhong University Of Science And Technology Method and system for ensuring search completeness of searchable public key encryption
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption

Also Published As

Publication number Publication date
CN116915499B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
US8621221B1 (en) Method and system for event notification for wireless PDA devices
CN109274644B (en) Data processing method, terminal and watermark server
CN106453268A (en) Method for realizing express privacy protection in the logistics process
CN101325485A (en) A method for processing information in an electronic device, a system, an electronic device and a processing block
JP2007280180A (en) Electronic document
US10193874B2 (en) Communication system
KR101940983B1 (en) Device in multicast group
CN106548338B (en) Method and system for transferring resource numerical value
CN111698084B (en) Block chain-based concealed communication method
CN104077690B (en) Method and device for generating one-time password, authentication method and authentication system
CN111914291A (en) Message processing method, device, equipment and storage medium
CN104243149A (en) Encrypting and decrypting method, device and server
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN113811874A (en) Encrypted data verification method
CN105407467A (en) Short message encryption methods, devices and system
CN113536250A (en) Token generation method, login verification method and related equipment
US11270297B2 (en) Payment handling apparatus and method
CN116305300B (en) Fair privacy set intersection method
CN116915499B (en) Popularization data processing method and system
FR2925246A1 (en) DETECTION SECURITY OF UHF RADIO FREQUENCY TRANSACTIONS FOR CONTROL AND IDENTIFICATION
CN102761417A (en) Method for processing data transmission of terminals and terminal
KR101971428B1 (en) Contents exchange method based on interaction between users and system performing the same
Cai et al. RFID authentication protocol design methodology
US11496296B2 (en) Method of authentication for delivery of a product
CN114760111B (en) File confidentiality method and file confidentiality device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant